Internet and Network Security Fundamentals



Similar documents
APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security Fundamentals

CS5008: Internet Computing

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Security vulnerabilities in the Internet and possible solutions

A S B

General Network Security

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

Chapter 8 Security Pt 2

Client Server Registration Protocol

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Content Teaching Academy at James Madison University

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Overview. SSL Cryptography Overview CHAPTER 1

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

COSC 472 Network Security

Securing Cisco Network Devices (SND)

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

TCP/IP and Encryption. CIT304 University of Sunderland Harry R. Erwin, PhD

A Very Incomplete Diagram of Network Attacks


EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Chapter 8. Network Security

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Network Security: Introduction

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Cornerstones of Security

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Description: Objective: Attending students will learn:

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

What is Web Security? Motivation

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Chapter 10. Network Security

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

How To Write A Transport Layer Protocol For Wireless Networks

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Security Technology White Paper

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

co Characterizing and Tracing Packet Floods Using Cisco R

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Security (II) ISO : Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012

Implementing Cisco IOS Network Security

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CSEP 561 Network Security. David Wetherall

Wireless Networks. Welcome to Wireless

EXAM questions for the course TTM Information Security May Part 1

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Chapter 10. Cloud Security Mechanisms

Chapter 7 Transport-Level Security

Security + Certification (ITSY 1076) Syllabus

Security. Friends and Enemies. Overview Plaintext Cryptography functions. Secret Key (DES) Symmetric Key

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Network Security and Firewall 1

Security Goals Services

CTS2134 Introduction to Networking. Module Network Security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

IINS Implementing Cisco Network Security 3.0 (IINS)

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Skoot Secure File Transfer

CS 348: Computer Networks. - Security; 30 th - 31 st Oct Instructor: Sridhar Iyer IIT Bombay

Savitribai Phule Pune University

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

CSE/EE 461 Lecture 23

Information Security

SCP - Strategic Infrastructure Security

Lecture G1 Privacy, Security, and Cryptography. Computing and Art : Nature, Power, and Limits CC 3.12: Fall 2007

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Secure Socket Layer. Introduction Overview of SSL What SSL is Useful For

PRINCE GEORGE'S COMMUNITY COLLEGE OFFICE OF INSTRUCTION MASTER COURSE SYLLABUS

All vulnerabilities that exist in conventional wired networks apply and likely easier Theft, tampering of devices

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

IT Networks & Security CERT Luncheon Series: Cryptography

Chapter 8 Security. IC322 Fall Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

The Trivial Cisco IP Phones Compromise

Network Security Concepts: Review

Chap. 1: Introduction

ISM/ISC Middleware Module

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Authentication Types. Password-based Authentication. Off-Line Password Guessing

Linux Network Security

: Network Security. Name of Staff: Anusha Linda Kostka Department : MSc SE/CT/IT

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Protocol Rollback and Network Security

Transport Level Security

Topics in Network Security

Transcription:

Internet and Network Security Fundamentals

Presenters Champika Wijayatunga Training Manager, APNIC champika@apnic.net

Overview Network Security Basics Security Issues, Threats and Attacks Cryptography and Public Key Infrastructure Security on Different Layers Layer 2 and BGP Security Server and Operational Security

Acknowledgements Merike Kaeo from Double Shot Security and the author of Designing Network Security. APNIC acknowledges her contribution and support with appreciation and thanks.

Network Security Basics

1 Why Security? Security threats are real And need protection against Fundamental aspects of information must be protected We can t keep ourselves isolated from the INTERNET

1 Why Security? Source: http://www.arbornetworks.com/report Most infrastructure attacks are unreported

Breach Sources Aggregation Infiltration Source: Trustwave Global Security Report https://www.trustwave.com/global-security-report.php Exfiltration

1 Types of Security Computer Security - generic name for the collection of tools designed to protect data and to thwart hackers Network Security - measures to protect data during their transmission Internet Security - measures to protect data during their transmission over a collection of interconnected networks

1 Goals of Security Confidentiality Integrity Availability prevents unauthorized use or disclosure of information safeguards the accuracy and completeness of information authorized users have reliable and timely access to information SECURITY

Basic ISP Infrastructure SMEs Telecommuters ISP Other ISPs Home Users Large Enterprise

Module 2 NETWORK SECURITY CONCEPTS

2 Terminology Access control - ability to permit or deny the use of an object by a subject. It provides 3 essential services: - Identification and authentication (who can login) - Authorization (what authorized users can do) - Accountability (identifies what a user did)

AAA Authentication Authorization Accountability

2 Authentication Validating a claimed identity of an end user or a device such as host, server, switch, router, etc. Must be careful to understand whether a technology is using user, device or application authentication.

Authorization The act of granting access rights to a user, groups of users, system, or program. - Typically this is done in conjunction with authentication.

Authentication and authorisation Service Authentication Is this really user X? Authorisation What can user X do? End user User Application Device 17

Non-Repudiation A property of a cryptographic system that prevents a sender from denying later that he or she sent a message or performed a certain action.

Audit A chronological record of system activities that is sufficient to enable the reconstruction and examination of a given sequence of events

Vulnerability A weakness in security procedures, network design, or implementation that can be exploited to violate a corporate security policy - Software bugs - Configuration mistakes - Network design flaw Exploit - Taking advantage of a vulnerability

Risk The possibility that a particular vulnerability will be exploited - Risk analysis: the process of identifying: Security risks Determining their impact And identifying areas require protection

Threat Any circumstance or event with the potential to cause harm to a networked system - Denial of service Attacks make computer resources (e.g., bandwidth, disk space, or CPU time) unavailable to its intended users - Unauthorised access Access without permission issues by a rightful owner of devices or networks - Impersonation - Worms - Viruses

Risk management vs. cost of Risk mitigation security - The process of selecting appropriate controls to reduce risk to an acceptable level The level of acceptable risk - Determined by comparing the risk of security hole exposure to the cost of implementing and enforcing the security policy Assess the cost of certain losses and do not spend more to protect something than it is actually worth

Attack sources Active vs. passive - Active = Writing data to the network Common to disguise one s address and conceal the identity of the traffic sender - Passive = Reading data on the network Purpose = breach of confidentiality Attackers gain control of a host in the communication path between two victim machines Attackers has compromised the routing infrastructure to arrange the traffic pass through a compromised machine

Attack sources On-path vs. Off-path - On-path routers (transmitting datagrams) can read, modify, or remove any datagram transmitted along the path - Off-path hosts can transmit datagrams that appear to come from any hosts but cannot necessarily receive datagrams intended for other hosts If attackers want to receive data, they have to put themselves on-path - How easy is it to subvert network topology? It is not easy thing to do but, it is not impossible Insider or outsider - What is definition of perimeter/border? Deliberate attack vs. unintentional event - Configuration errors and software bugs are as harmful as a deliberate malicious network attack

What are security aims? Controlling data / network access Preventing intrusions Responding to incidences Ensuring network availability Protecting information in transit

Security services Authentication Authorisation Access control Data integrity Data confidentiality Auditing / logging DoS mitigation

Threats and Attacks

Attacks on Different Layers Application Presentation Session Transport Network Data Link Physical Layer 4: TCP, UDP Application Layer 7: DNS, DHCP, HTTP, FTP, IMAP, LDAP, NTP, Radius, SSH, SMTP, SNMP, Telnet, DNS TFTP Poisoning, Phishing, SQL injection, Spam/Scam Transport Layer 5: SMB, NFS, TCP Socks attacks, Routing attack, SYN flooding, Sniffing Internet Layer 3: IPv4, IPv6, ICMP, IPSec Ping/ICMP Flood Layer 2: ARP, Token Ring ARP spoofing, MAC flooding Network Access

Layer 2 Attacks ARP Spoofing MAC attacks DHCP attacks VLAN hopping

1 ARP Spoofing I want to connect to 10.0.0.3. I don t know the MAC address ARP Request Wait, I am 10.0.0.3! 10.0.0.2 BB-BB-BB-BB-BB-BB 10.0.0.1 AA-AA-AA-AA-AA-AA ARP Reply 10.0.0.3 CC-CC-CC-CC-CC-CC - Client s ARP Cache already poisoned - It will communicate directly to the fake - destination 10.0.0.4 DD-DD-DD-DD-DD-DD I am 10.0.0.3. This is my MAC address

MAC Flooding Exploits the limitation of all switches fixed CAM table size CAM = Content Addressable memory = stores info on the mapping of individual MAC addresses to physical ports on the switch. Port 1 Port 2 Port 3 Port 4 00:01:23:45:67:A1 x 00:01:23:45:67:B2 x 00:01:23:45:67:C3 x 00:01:23:45:67:D4 x

VLAN Hopping Attack on a network with multiple VLANs Two primary methods: - Switch spoofing attacker initiates a trunking switch - Double tagging packet is tagged twice.

DHCP Attacks DHCP Starvation Attack - Broadcasting vast number of DHCP requests with spoofed MAC address simultaneously. - DoS attack using DHCP leases Rogue DHCP Server Attacks Server runs out of IP addresses to allocate to valid users Attacker sends many different DHCP requests with many spoofed addresses.

DHCP Attack Types Solution: enable DHCP snooping ip dhcp snooping (enable dhcp snooping globally) ip dhcp snooping vlan <vlan-id> (for specific vlans) ip dhcp snooping trust ip dhcp snooping limit rate <rate>

Layer 3 Attacks ICMP Ping Flood ICMP Smurf Ping of death

1 Ping Flood Internet Attacker Other forms of ICMP attack: - Ping of death - ICMP ping flood Broadcast Enabled Network Victim

TCP Attacks SYN Flood occurs when an attacker sends SYN requests in succession to a target. Causes a host to retain enough state for bogus half-connections such that there are no resources left to establish new legitimate connections.

1 TCP Attacks Exploits the 3-way handshake Attacker sends a series of SYN packets without replying with the ACK packet Finite queue size for incomplete connections SYN SYN + ACK Attacker ACK Server (Victim)

1 Routing Attacks Attempt to poison the routing information Distance Vector Routing - Announce 0 distance to all other nodes Blackhole traffic Eavesdrop Link State Routing - Can drop links randomly - Can claim direct link to any other routers - A bit harder to attack than DV BGP attacks - ASes can announce arbitrary prefix - ASes can alter path

1 Application Layer Attacks Applications don t authenticate properly Authentication information in clear - FTP, Telnet, POP DNS insecurity - DNS poisoning - DNS zone transfer

1 Application Layer Attacks Scripting vulnerabilities Cookie poisoning Buffer overflow Hidden field manipulation Parameter tampering Cross-site scripting SQL injection

1 Server Side Scripting Server-side scripting program is executed on the server and not on the user s browser or plugin. ASP.NET, PHP, mod_perl, CGI, Ruby, Python Benefits: - Cross-platform - No plugin required on user side Disadvantages: - Dynamic scripts create new security concern, exploiting code flaws

1 Cross-Site Scripting Cross-site scripting or XSS enables attackers to inject scripts into webpages viewed by other users. Persistent XSS more devastating Non-persistent XSS more common Ex: BeEF (Browser Exploitation Framework)

1 SQL Injection SQL Injection a subset of unverified user input vulnerability that injects malicious code (or SQL query) into strings. This code is executed when passed on to the SQL server.

Corrupting data" Zone administrator Zone file 1" DNS Vulnerabilities Impersonating master" 4" master Caching forwarder Cache impersonation" 2" 3" 5" Dynamic updates Unauthorized updates" slaves Cache pollution by" Data spoofing" resolver Server protection! Data protection!

1 DNS Cache Poisoning Caching incorrect resource record that did not originate from authoritative DNS sources. Result: connection (web, email, network) is redirected to another target (controlled by the attacker)

DNS Cache Poisoning 1 I want to access www.example.com DNS Caching server The IP address of www.example.com is 192.168.1.99 (pretending to be the authoritative zone) Bogus webserver Client 2 QID=64571 www.example.com ns.example.com

DNS Amplification Queries for www.example.com The IP address of www.example.com is 192.168.1.99 DNS Recursive server ns.example.com Compromised Machines (spoofed IP) Attacker Victim Server

1 Common Types of Attack Man-in-the-middle attack intercepts messages that are intended for a valid device Ping sweeps and port scans Hijacking and Spoofing -sets up a fake device and trick others to send messages to it Sniffing capture packet as they travel through the network DoS and DDoS

1 Wireless Attacks WEP first security mechanism for 802.11 wireless networks Weaknesses in this protocol were discovered by Fluhrer, Mantin and Shamir, whose attacks became known as FMS attacks Tools were developed to automate WEP cracking Chopping attack were released to crack WEP more effectively and faster

1 Man in the Middle Attacks (Wireless) Creates a fake access point and have clients authenticate to it instead of a legitimate one. Capture traffic to see usernames, passwords, etc that are sent in clear text.

1 Examples How to Crash the Internet h"p://www.zdnet.com/blog/networking/how- to- crash- the- internet/680?

How do we protect our system?

Cryptography

2 Cryptography Has evolved into a complex science in the field of information security

What is Cryptography? Part of a field of study known as cryptology Cryptology includes: - Cryptography Study of methods for secret writing Transforming messages into unintelligible form Recovering messages using some secret knowledge (key) - Cryptanalysis: Analysis of cryptographic systems, inputs and outputs To derive confidential information

2 Cryptography Encryption process of transforming plaintext to ciphertext using a cryptographic key Symmetric key cryptography uses a single key to both encrypt and decrypt information. Also known as private key. - Includes DES, 3DES, AES, IDEA, RC5, Blowfish Asymmetric key cryptography separate keys for encryption and decryption (public and private key pairs) - Includes RSA, Diffie-Hellman, El Gamal

Terminology of cryptography Cipher - Cryptographic technique (algorithm) applying a secret transformation to messages Plaintext / cleartext - Original message or data Encryption - Transforming plaintext, using a secret key, so meaning is concealed Ciphertext - Unintelligible encrypted plaintext Decryption - Transforming ciphertext back into original plaintext Cryptographic Key - Secret knowledge used by cipher to encrypt or decrypt message

2 Cryptography Plaintext ENCRYPTION ALGORITHM Ciphertext DECRYPTION ALGORITHM Plaintext Encryption Key Decryption Key Shared Key Shared Key Symmetric Key Cryptography Public Key Private Key Asymmetric Key Cryptography

2 Symmetric Key Algorithm Stream ciphers encrypts bits of the message at a time Block ciphers takes a block of bits and encrypts them as a single unit

2 Cryptography Digital Signature sender encrypts message with own private key instead of encrypting with intended receiver s public key Message digests produces a condensed representation of a message (hashing) - MD5 - SHA-1 - HMAC

2 Secret Key Algorithms DES block cipher using shared key encryption, 56-bit 3DES (Triple DES) a block cipher that applies DES three times to each data block RC4 variable-length key, stream cipher (generate stream from key, XOR with data) AES replacement for DES; current standard

2 DES Data Encryption Standard Developed by IBM for the US government in 1973-1974, and approved in Nov 1976. Based on Horst Feistel s Lucifer cipher block cipher using shared key encryption, 56-bit key length Block size: 64 bits

2 Triple DES 3DES (Triple DES) a block cipher that applies DES three times to each data block Uses a key bundle comprising of three DES keys (K1, K2, K3), each with 56 bits excluding parity. DES encrypts with K1, decrypts with K2, then encrypts with K3 - C i = E K1 (D K2 (E K1 (P i ))) Disadvantage: very slow

Secret Key Encryption Shared Secret Key DES Shared Secret Key DES Sensitive Information (Cleartext) ENCRYPT Internet (Ciphertext) DECRYPT Sensitive Information (Cleartext) Common Algorithms: DES, 3DES, AES, IDEA

Triple DES (3DES) K1 K2 K3 Plaintext Block 1 ENCRYPT ENCRYPT ENCRYPT Ciphertext 1 Many applications use K3=K1, yielding a key length of 112 bits Interoperable with conventional DES if K1=K2=K3

2 AES Advanced Encryption Standard (AES) Cipher Published in November 2001 Symmetric block cipher Has a fixed block size of 128 bits Has a key size of 128, 192, or 256 bits Based on Rijndael cipher which was developed by Joan Daemen and Vincent Rijmen

Hash Functions A hash function takes an input message of arbitrary length and outputs fixed-length code. The fixed-length output is called the hash, or the message digest, of the original input message. Common Algorithms: MD-5 (128), SHA-1 (160)

2 Hashing Also called a digest or checksum A form of signature that represents the data. Uses: - Verifying file integrity - if the hash changes, it means the data is either compromised or altered in transit. - Digitally signing documents - Hashing passwords

2 Hashing MD5 Message Digest Algorithm - Outputs a 128-bit fingerprint of an arbitrary-length input SHA-1 (Secure Hash Algorithm) - Outputs a 160-bit message digest similar to MD5 - Widely-used on security applications (TLS, SSL, PGP, SSH, S/MIME, IPsec)

6 Diffie-Hellman Diffie-Hellman Protocol requires that both the sender and recipient of a message have key pairs. Combining one s private key and the other s public key, both parties can compute the same shared secret number.

6 Diffie-Hellman http://en.wikipedia.org/wiki/file:diffiehellman.png

DH Man-in-the-Middle Attack Diffie-Hellman is subject to a man-in-the-middle attack Digital signatures of the public values can enable each party to verify that the other party actually generated the value a, p X A X B Y A Y B => DH exchanges need to be authenticated!!

2 Trusted Network Standard defensive-oriented technologies - Firewall - Intrusion Detection Build TRUST on top of the TCP/IP infrastructure - Strong authentication - Public Key Infrastructure (PKI)

2 Strong Authentication An absolute requirement Two-factor authentication - Passwords (something you know) - Tokens (something you have) Examples: - Passwords - Tokens - Tickets - Restricted access - PINs - Biometrics - Certificates

Public Key Infrastructure

2 Public Key Infrastructure Framework that builds the network of trust Combines public key cryptography, digital signatures, to ensure confidentiality, integrity, authentication, nonrepudiation, and access control Protects applications that require high level of security

PKI Components Certificate Authority (CA) a trusted third party - Trusted by both the owner of the certificate and the party relying upon the certificate Registration Authority (RA) binds keys to users - Users who wish to have their own certificate registers with the RA Validation Authority (VA) validates the user is who he says he is

2 Certificate Authority Components: - Certificate Authority a trusted third party Trusted by both the owner of the certificate and the party relying upon the certificate. - Validation Authority - Registration Authority

2 PKI Process Source: http://commons.wikimedia.org

2 Digital Certificate Digital certificate basic element of PKI; secure credential that identifies the owner Also called public key certificate

Digital Certificates Digital certificates deal with the problem of - Binding a public key to an entity - A major legal issue related to ecommerce A digital certificate contains: - User s public key - User s ID - Other information e.g. validity period Certificate examples: - X509 (standard) - PGP (Pretty Good Privacy) - Certificate Authority (CA) creates and digitally signs certificates

Digital Certificates To obtain a digital certificate, Alice must: - Make a certificate signing request to the CA - Alice sends to CA: Her identifier Id A Her public key K A_PUB Additional information CA returns Alice s digital certificate, cryptographically binding her identity to public key: - Cert A = {ID A, K A_PUB, info, Sig CA (ID A,K A_PUB,info)}

2 X.509 An ITU-T standard for a public key infrastructure for single-sign-on and Privilege Management Infrastructure (PMI) Assumes a strict hierarchical system of Certificate Authorities (CAs) Structure of a Certificate